Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are We Giving Virtual Assistants Too Much Leeway?

Are We Giving Virtual Assistants Too Much Leeway?

Virtual assistants have seen an increased usage in the workplace, improving general productivity, but not without placing organizations at considerable risk if left unchecked. Depending on how much you rely on virtual assistants, you might want to take a closer look at what data is being accessed by them, and the role they play in your organization.

Some of the most common virtual assistants include Apple’s Siri, Google Assistant, Microsoft’s Cortana, and Amazon’s Alexa. You may have seen these voice-activated apps in your devices, even if you don’t use them.

These devices have improved in functionality, and while these functionalities are well-suited to the workplace, always-on microphones make some users suspicious about their use. After all, it’s incredibly difficult to tell what a microphone is listening to and how sensitive the data being accessed is. If you’re not careful, the data could be sent to a third party simply by being spoken in front of a listening device.

This creates a complication for anyone hoping to get things done with a personal assistant application. Everyone who considers using them must ask themselves if the risks are worth the benefits. Here are a few topics to consider before implementing personal assistants.

Is It Just Another Internet of Things Device?
The risks involved with Internet of Things devices are well-known to most business professionals. For example, the Mirai botnet was capable of enslaving Internet of Things devices and using them to fuel attacks against its targets. It might be difficult to remember that these virtual assistants are nothing more than applications on Internet-connected devices, meaning that they are certainly at risk of being compromised by similar threats.

If you keep in mind that these devices are always listening, however, it becomes easier to create policies regarding the potential security risk that they may pose. For example, if your office is in a place where sensitive information is often spoken out loud, a virtual assistant is something you should try to keep away from that location. Furthermore, it’s very important that you don’t put your wireless network at risk.

Whose Devices Are They?
Data privacy and ownership is a huge deal in the business environment, and this could complicate the situations you face with virtual assistants. Imagine a scenario in which an employee brings a virtual assistant to the workplace; while the company isn’t spending as much on the device itself, the device might be outside the control of the business in regard to security and privacy. The question of how you enforce data privacy on devices outside of your control becomes a central issue.

Policies Are Your Greatest Asset
To keep your organization safe while still using virtual assistants, you need to establish firm control over what you can. This means that you should operate under the assumption that your devices are always listening to what you have to say and adopt a policy that these assistants should be kept out of areas where sensitive information is discussed. You need to spread this awareness to others in the workplace, and any device with a microphone should be treated with at least a little bit of scrutiny. Phones can possibly be hacked, and laptops could have monitoring software installed on them without the user’s knowledge.

Voyage Technology can help your organization ensure that the various aspects of security don’t hold your business back. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 01 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer Collaboration IT Services Hosted Solutions Users Mobile Device Ransomware Quick Tips Microsoft Cybersecurity Small Business Workplace Strategy Passwords Communication Data Backup Smartphone Backup Saving Money Android VoIP Business Management Smartphones Mobile Devices communications Upgrade Disaster Recovery Data Recovery Browser Managed Service Social Media Managed IT Services Microsoft Office Windows Tech Term Remote Network Internet of Things Productivity Artificial Intelligence Facebook Current Events Automation Cloud Computing Covid-19 Server Managed Service Provider Remote Work Miscellaneous Gadgets Outsourced IT Information Holiday AI Encryption Employee/Employer Relationship Spam Windows 10 Office Compliance Business Continuity Government Data Management Training Wi-Fi Bandwidth Windows 10 Blockchain Virtualization Business Technology Two-factor Authentication Mobile Office Data Security Apps Managed Services Voice over Internet Protocol Networking Chrome Mobile Device Management Budget Gmail Apple Vendor App Employer-Employee Relationship Computing Tip of the week Information Technology Conferencing Hacker Avoiding Downtime Office 365 Marketing How To BDR BYOD WiFi Applications Access Control Risk Management Computers Retail Healthcare Analytics Website Office Tips Managed IT Services IT Support Augmented Reality Storage Password Bring Your Own Device HIPAA Router Virtual Private Network Big Data Health Operating System Help Desk Excel Document Management Customer Service Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Firewall Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions The Internet of Things Display Printer Social Going Green Paperless Office Windows 11 Infrastructure 2FA Monitoring Cybercrime YouTube Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Cryptocurrency Hacking Presentation Managed IT Service Virtual Desktop Maintenance Data storage Downloads LiFi Wireless Technology Antivirus iPhone Licensing Outlook Entertainment Vulnerabilities Money Data Privacy Humor Word Images 101 Telephone System Multi-Factor Authentication Robot Mobility Sports Cost Management Mouse Safety Administration IT Management VPN Employees Meetings Physical Security Integration User Tip Modem Processor Computer Repair Mobile Security Holidays Settings Wireless Printing Content Filtering Data Storage Smart Technology Supply Chain Customer Relationship Management SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Chatbots Google Drive Navigation Competition Knowledge Management PCI DSS Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace 5G Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Private Cloud Identity Google Docs Evernote Paperless Unified Communications Experience Server Management Regulations Compliance User Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Bitcoin Running Cable Download Net Neutrality Twitter Alerts SQL Server Technology Care Google Wallet Error History Business Communications Financial Data Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams Windows 8 IP Address Laptop Upload Procurement Remote Computing Azure Hybrid Work Drones Cyber security Multi-Factor Security Tech Human Resources Social Network Telework Recovery CES Tablet IoT Communitications Dark Web Cables Halloween Hard Drives Trends Supply Chain Management Alert Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps Domains Scary Stories Data Analysis Star Wars IT Assessment How To Microsoft Excel IT Maintenance Hacks Notifications Staff Value Business Intelligence Refrigeration Fun Gamification Flexibility Organization Travel Social Networking Legislation Shortcuts Deep Learning Public Speaking Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Lithium-ion battery Wearable Technology Memory Vendors Education Entrepreneur Content Remote Working Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Mobile Computing Wasting Time Threats Undo Search Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Best Practice Buisness User Error Microchip Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Legal IT solutions Username Point of Sale eCommerce Black Friday SSID Business Growth Application Database Surveillance Virtual Assistant Outsource IT Tech Support IT Technicians Virtual Machine Environment Media Cortana Network Management Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Alt Codes IBM Downtime Tactics Development Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays Hosted Solution Shopping Nanotechnology Optimization PowerPoint Typing

Blog Archive